Jennifer DeTrani
-
On Detecting And Deterring Moles And Miscreants In The Workplace
Organizations cannot simply deconstruct and rebuild their workforces and networks.
-
Hacker Diplomacy: Minimizing Business Risks Stemming From Vulnerability Disclosures
Security researchers should understand that their research could lead to existential events for a company.
-
-
Practicing Law — And Compassion — In A COVID-19 World
We are rooting for all of humanity, as a disheveled team with chapped — but disinfected — hands.
-
An Exiled Chinese Billionaire And The Duty Of Reasonable Care
Cyber vigilance is the new normal.
-
Short And Distort: How Companies Are ‘Bearing’ Down On Market-Shifting Disinformation (Part II)
Keeping ahead of market-shifting disinformation is a full-time, full-contact activity,
-
Short And Distort: How Companies Are ‘Bearing’ Down On Market-Shifting Disinformation
It’s pump and dump in a bull market, short and distort in a bear one.
-
When Trademarks Attack: How To Detect And Disarm Doppelgänger Domains
Typosquatting remains a vulnerability for phishing attacks against companies.
-
Duck, Cover, And Hold: A Lawyer’s Role In Securing Companies Against Nation-State Attacks
Cyber risk is no longer just a problem for the IT department.
-
Tightrope Walking The Digital Supply Chain (Part II)
How the False Claims Act has upped the ante on security and the insider threat.
-
-
Tightrope Walking The Digital Supply Chain (Part I)
How the False Claims Act has upped the ante on security and the insider threat.
-
The Disinformation Dilemma (Part I)
Disinformation attacks create the perfect storm on a global level by traversing hemispheres and social classes in a matter of moments.
-
Getting Started With ‘Smart’ Security (Part II)
Before integrating AI into your security protocols, make sure to first have a strong technical security foundation in place.
-
Artificial Intelligence is on track to disrupt well, everything — but when it comes to AI and cybersecurity, there’s plenty to consider before implementing AI-based technology in your organization.
-
How To Control Your Digital Footprint Without Losing Your Mind
Note that this is not a one-time exercise, but a digital hygiene process which should be rinsed and repeated at regular intervals.
-
On The Fintech Carousel: Entering The Mobile Payments Space Requires Vision And Equilibrium
What lies ahead in fintech is a groundswell of rapidly and constantly developing regulatory requirements and unbridled opportunity.
-
Strengthening The ‘Soft Underbelly’ Of Cybersecurity (Part II)
Attack simulations, physical security, social engineering, and open source intelligence assessments can help law firms learn and self-correct before a real hacker gets through first.
-
Strengthening The ‘Soft Underbelly’ Of Cybersecurity
Attack simulations, physical security, social engineering, and open source intelligence assessments can help law firms learn and self-correct before a real hacker gets through first.